What the Network Can Do in the Face of the Consumerization of IT

By

The consumerization of IT is a trend that is blowing the minds of enterprise decision-makers and IT professionals, spurred on by the bring-your-own-device, or BYOD, developments and the growing mobile workforce. While BYOD increases productivity and responsiveness in employees, it compromises the security of a business’ network.

Some of the challenges, from a network perspective, and what networks can do surrounding the consumerization of IT were highlighted by Shehzad Merchant, VP of Technology for Extreme Networks, today at the NetEvents Americas conference in Miami, FL. He began by noting that the trend of Ethernet going everywhere, beyond what it has been in the past, coincides with the increasing trend of moving to the cloud.

While the move to the cloud is changing the game for the enterprise in terms of IT infrastructure, it also allows for change in cost structure. It allows businesses to add in and take away capacity on-demand, but how can networks be optimized for such change as well as the new world of application mobility? How can IT departments adjust to the expectation that they now respond to this inclusion of tons of devices operating on their networks in a secure way?

Merchant explored these questions by starting with two other basic questions: What does the user want? What does the IT department want? Users want to be onboarded immediately without IT dependency and to have a seamless experience. IT departments want complete visibility into their networks and control over devices across the networks.

This element of control is what is missing today, according to Merchant. The key to this solution is automation, simply because doing this in a manual approach does not work. The approach needs to be centralized.

The network today needs to be “smarter,” said Merchant. As the network is static right now, functioning in a reactive way instead of a proactive way, the network needs to move to a participatory role to improve device and application awareness. Through transparent authentication, such as performing awareness when a user logs in, the network can then determine how much and what kind of access that user should be given depending on whether he or she is an employee, a contractor, or a guest.

“The specification of policies needs to be in a human language,” said Merchant. “We need a centralized mechanism. We need a central policy framework based on user, device, location, and time of day.” The capacity for this type of action exists in the network right now, but the network has yet to employ it.




Edited by Brooke Neuman
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

TechZone360 Managing Editor

SHARE THIS ARTICLE
Related Articles

ChatGPT Isn't Really AI: Here's Why

By: Contributing Writer    4/17/2024

ChatGPT is the biggest talking point in the world of AI, but is it actually artificial intelligence? Click here to find out the truth behind ChatGPT.

Read More

Revolutionizing Home Energy Management: The Partnership of Hub Controls and Four Square/TRE

By: Reece Loftus    4/16/2024

Through a recently announced partnership with manufacturer Four Square/TRE, Hub Controls is set to redefine the landscape of home energy management in…

Read More

4 Benefits of Time Tracking Software for Small Businesses

By: Contributing Writer    4/16/2024

Time tracking is invaluable for every business's success. It ensures teams and time are well managed. While you can do manual time tracking, it's time…

Read More

How the Terraform Registry Helps DevOps Teams Increase Efficiency

By: Contributing Writer    4/16/2024

A key component to HashiCorp's Terraform infrastructure-as-code (IaC) ecosystem, the Terraform Registry made it to the news in late 2023 when changes …

Read More

Nightmares, No More: New CanineAlert Device for Service Dogs Helps Reduce PTSD for Owners, Particularly Veterans

By: Alex Passett    4/11/2024

Canine Companions, a nonprofit organization that transforms the lives of veterans (and others) suffering PTSD with vigilant service dogs, has debuted …

Read More